As cyber crime reaches new levels with new malware & viruses being realized online on a daily basis it also becomes apparent that the increase in DDoS tools that require no apparent skills to use them, just providing the IP address it is possible to launch the attack. These tools are becoming more and more available on the Internet.
We are all aware of the effects of a DDOS attack can have on a company not only rendering their website inaccessible, but also causing a loss in online revenue & sales.
With the release of such applications comes the added threat of users knowingly allowing backdoors to their computer systems to allow the creators access to your device to continue attacks in your absence. Not only does a back door in a system allow the distributor access but also anyone else who finds the vulnerability.
The main concern is that in general many young people are downloading and using theses tools but also the fact that they are told under false illusions to use them and believe they are safe in taking part in denial of service attacks on high profile sites including government domains causing sites to go offline and un reachable.
It’s very important nowadays to be aware of what your children are downloading on the Internet and that you only install applications that are from verified software companies and scanned before install or execution.
These groups are spreading their vulnerable applications through more and more blatant means on mainstream social media were most younger generations reside on the web.
( I am not going to advise on how to use denial of service and stay anonymous but I can assure the application you installed is not protecting you it’s infecting your system. )
Please see the below DDoS tools & applications found by our cyber research division at Frontline Cyber Security Ltd in a short search over some popular social media sites (Mention No Names). We were seeing how easily accessible DDOS tools are to the general web user.
Distributed denial of service application’s found ( Details removed of download links please contact us if you are a researcher / analyst. )
Here is an image of the Android application running fill out a few boxes and click send.
We also obtained a list of targets theses applications were released to attack and have also managed to collect screen shots of the tools in use against government sites.
Below are some images of the application being used in what appears to be one of many Anonymous Operations in this case #OpIsrael.
We have a list of servers the tool was designed to attack but are unable to post it at this time.
The below image shows the application being shared and distributed
In regards to the above DDoS tools, the relevant authorities have been notified and are assisting in having them removed.
About the Author: Frontline Cyber Security Ltd
(Security Affairs – DDoS tools, hacking)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.